Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalPhysical Security

The young endangered: Is cyber radicalization intensifying in the age of COVID?

By Tasneem Tahrin
Global Terrorism
January 6, 2021

This year began differently with humanity flustered, confused and hysteric as the novel coronavirus dawned on us. COVID-19 alarmed the health sector so much that additional societal consequences were not adequately addressed. As most nations went under lockdown, the use of the internet exponentially rose. Radical groups, during this time, could easily claw onto their targets, refurbish their agendas and further their causes. Activists involved in extremist pursuit, either left, right, cultural, religious and even those included in Jihadist terrorism, could easily grasp the opportunities the pandemic has to offer to add to their objectives.

As the worldwide internet presence skyrocketed with schools, businesses, corporations, agencies, banks, and all of civil life having gone online, so did militant groups, already having been internet-active for the past few recent years.

Across the globe, radicalization, or Islamist extremism to be more specific, surfaced during the pandemic even when it wasn’t expected. Earlier in June, for example, Bangladesh’s 10 Minute School founder, Ayman Sadiq, received online death threats by an unknown Islamist group. Even in the developed world, it has become evident that cyber radicalization in young people are at a rise during the pandemic. In fact, the internet presence of radical organizations, mainly Islamist militant groups, has been very active, as their propaganda can be accessed through social media, dark networks and so on. Spreading propaganda and steady radicalization via the internet is not a new phenomenon for many Jihadist networks. This brings us back to determining how critical online radicalization is during the pandemic.

The scopes that the pandemic may escort for radicalizing youth targeted through the cyberspace are numerous:

1.      An extended online presence of the youth during the pandemic, with limitations to access the outside world, without a doubt has increased their risk of radicalization. Almost all school and tertiary education systems, especially universities, are teaching online. Students have no choice but to indulge in online learning, which grants them access to more internet time.

2.      Common youth frustrations such as unemployment, education inequalities, income inequalities, lack of opportunities and social grievances have pertained in the developing and underdeveloped societies for a long time. The coronavirus pandemic has, without a doubt, worsened these issues within the youth. Terror units are more inclined on gaining from these weaknesses during this time.

3.      Internal displacement is felt greatly in the poorer countries with COVID-19 having caused mass economic losses and social disparities. South Asian and African nations have felt this greatly, with many youths, along with their families, being forced to relocate from the urbans, which causes enormous frustrations and grievances within them. It fuels their identity crises and could easily benefit terrorist units to attain targets.

4.      Health sectors have not been particularly triumphant in addressing the concerns of the people, even when it came to the world’s most competent nations. Drawbacks in efficient responses by governments in attending to the health and social securities of the youth during the pandemic aggravates them, creating more space for militants to recruit them.

5.      Trending in poorer nations mostly, an increased blame-game continues to ensue as many people point at the marginalized communities as a leading cause of the spread of the pandemic, such as from the Rohingya refugees in Cox’s Bazar. This may lead to an increased community-based hatred within youths, and radical ideas may coerce them into derailing from common morals.

6.      Militant groups during this time not only could provide a spiritual dictation to justifying radicalization but may also have attained ways to provide economic and social benefits to youths who are suffering from confusion and personal grievances, which allows radicalization and recruitment to be so much easier now than ever.

7.      Finally, poorer nations of the world, such as in South Asia or Africa, have been observing a social ecosystem incorporated with cultural and religious sensitivity for many decades which radical Islamist groups have exploited. The turmoil of the pandemic was weaponized by radical organizations who have even termed COVID-19 as a “soldier of God.” This apocalyptic narrative by radical Islamist groups can further contribute to their extremist agendas. All over the world, there are already multiple accounts of incidents where the virus was seen as nothing but a conspiracy, attacks were encouraged, and extreme propagandas continued to prevail.

 

Furthermore, the impacts of the pandemic itself would play a large role in contributing to the rise of radicalized youth. With less youth continuing their education due to the hardships the pandemic has brought upon their families and themselves, more youth are expected to be unemployed, hence a large portion of them could fall victim to socioeconomic isolation. Due to the pandemic, strengthening community values within these youth may not succeed, making it more alluring for them to be radicalized in dictation of spiritualism and religion. Lastly, recreational activities during the pandemic might also contribute to online radicalization of the youth. COVID-19 has limited access to numerous recreations, which frustrates young people deeply.

However, being confined at home and having easy access to the internet has given youth the opportunity to seek other means of entertainment: The first is social media and streaming sites that allow the youth to view unverified and inauthentic online content, and as terror units propagate their agendas throughout the cyberspaces the youth dwell in on a daily basis, it gives these militants more space to secure targets.

 The second would be video gaming, which is not particularly new. ISIS, in the past, has attracted public attention through showcasing footage collected through helmet cameras during criminal operations that resemble first-person shooter games that youth are extremely indulged in. The gamification of terror may occur through livestreams of attacks or incorporation of gamified elements in the tools and strategies of militant wings. Making propaganda seem more modern and trendier through the use of video-games appearing as “cool and appealing” to youth is a recent but not surprising strategy of extremists. During the pandemic, youth have been more available to online gaming, often competitive ones that include elements of violence and warfare, which gives the terrorist groups another gateway to pursue their targets.

KEYWORDS: COVID-19 extremists public safety social media

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tasneem Tahrin is an undergraduate senior at Bangladesh University of Professionals, pursuing a Bachelor of Social Science in International Relations. Her key research interests involve security and intelligence studies, youth and gender-based security and counterterrorism. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video management

    Video technologies help retailers deliver a safe in-store shopping experience in the age of COVID-19

    See More
  • mass notification freepik

    How to optimize critical communications in the age of COVID-19 (and beyond)

    See More
  • insurance-cyber-freepik5868.jpg

    The rising tide of cyber insurance premiums in the age of ransomware

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!